Blog Posts Tagged with "Hacking"

The presentation at BlackHat demonstrated how simple software designed to exploit a security hole in the authentication mechanism is used to update the firmware on automated teller machines could make an ATM dispense cash on demand...

With so many tracks there was no shortage of interesting topics at the same time slot. Since there were no database specific talks on the first day, I had a great opportunity to expand my horizon and check out some areas that I’m only somewhat familiar with - here's a summary...

One can certainly see this train wreck coming with the potential for company names to be plastered all over the Internet with the embarrassing results of their social engineering-induced data leakage...

Routing only sends the module through the session. Once the payload runs for exploit modules, it's is calling straight back to the LHOST attacker box, not through the session. So, you can now exit session 1 NETWORK SERVICE, as it's not really needed any more...

The exam is in revision 6 now, and tests a wide range of techniques from reading and analyzing TCP dumps and Snort logs, understanding the OSI model, how to use many of the common exploit tools, recognizing the exploits and their uses, and so on...

My solution? Create a standard that we all abide by. I know as hackers we rebel against such things but in the interest of getting better security out there we should should really work together on this...

July 14, 2010 Added by:

It is important to understand that the EIs continue to use our infrastructure against as they have over the years during physical attacks and currently using social network software and sites to drive awareness and training while building recruitment through online communities and various forms of propaganda...

Defcon is known for its antics but it’s also an event where hackers of all flavors improve their skills. The game they are playing this year is a social engineering fun-o-rama called Social Engineering CTF, referencing the game Capture the Flag...

So you wanna go to the dark side? You’ve been hearing all about this hacking thing and you’d like to impress your girlfriend and show her how you can hack into corporate databases eh? Well, first if you are nodding your head, you’re an idiot. Second, chances are better than ever that you’ll get caught.

The terms "cyber terrorism" or "information warfare" are derived from political agendas of those who rule the countries or from global conglomerates and large corporations that don't hesitate to use any possible measures to achieve their goal. The information age gave us not only sophisticated computer equipment, software, and gadgets but also something that many of u...